Showing 981 - 1,000 results of 1,810 for search '(( resource detection function ) OR (( source OR sources) detection function ))', query time: 0.40s Refine Results
  1. 981

    Real-World Efficacy of Explainable Artificial Intelligence using the SAGE Framework and Scenario-Based Design by Eleanor Mill, Wolfgang Garn, Chris Turner

    Published 2024-12-01
    “…The first of its kind, it leverages three distinct but complementary frameworks to support a user-centric and context-sensitive, post-hoc explanation for fraud detection. Using the principles of scenario-based design, it amalgamates two independent real-world sources to establish a realistic card fraud prediction scenario. …”
    Get full text
    Article
  2. 982

    Research on a traffic flow statistical algorithm based on YBOVDT and SAM2 by Yuanyuan Wang, Zheng Ding, Jiange Liu, Kexiao Wu, Md Sharid Kayes Dipu, Tingmei Ma, Yonghao Ma, Haiyan Zhang

    Published 2025-05-01
    “…To address these challenges, this paper proposes a traffic flow statistical method based on YBOVDT(YOLO-World and BOT-SORT-Open Vocabulary Detection and Tracking)and SAM2.Specifically, in the method, this paper proposes a “Traffic Flow Data Processing and Analysis” module, aiming to optimize and supplement the five core functions required for traffic flow statistics tasks, thereby making the functions of the entire solution more comprehensive.In addition, this paper combines the latest open set object detection and tracking algorithms to enhance the recognition ability and tracking stability of traffic objects. …”
    Get full text
    Article
  3. 983

    Fine-grained access control method for private data in android system by Gang Liu, Guofang Zhang, Quan Wang, Shaomin Ji, Lizhi Zhang

    Published 2019-03-01
    “…In order to facilitate users to manage policies, the proposed framework implements automatic policy generation and policy conflict detection functions. The framework is implemented in TaintDroid and experiments indicate that the improvement is effective in achieving fine-grained access control to sensitive information and does not adversely affect the system overhead costs.…”
    Get full text
    Article
  4. 984

    Identification of key genes associated with mesocotyl length through a genome-wide association study in rice by Li Xue, Li Xue, Sen Wang, Sen Wang, Qiuyu Zhang, Qiuyu Zhang, Bing Han, Di Cui, Longzhi Han, Jianxin Deng, Xiaoding Ma

    Published 2025-05-01
    “…In this study, 300 rice germplasm resources with a wide range of sources were selected as experimental materials. …”
    Get full text
    Article
  5. 985

    Optimizing maize germination forecasts with random forest and data fusion techniques by Lili Wu, Yuqing Xing, Kaiwen Yang, Wenqiang Li, Guangyue Ren, Debang Zhang, Huiping Fan

    Published 2024-11-01
    “…This study selected the Zheng Dan-958 maize variety to predict germination rates using multi-source information fusion and a random forest (RF) algorithm. …”
    Get full text
    Article
  6. 986

    Nurses’ usage of validated tools to assess for delirium in general acute care settings: A scoping review protocol [version 1; peer review: 2 approved] by Aoibhinn Boyd, Leona Bannon, Marcia Kirwan

    Published 2025-02-01
    “…It often affects hospital in-patients and is associated with an increased risk of mortality, dementia, and functional decline. Delirium can be detected through the use of validated assessment tools, administered by nurses, and early detection is associated with improved outcomes for patients. …”
    Get full text
    Article
  7. 987

    Effective disinfecting of negative pressure pipelines of DCUs reduces the risk of cross infection in dental care by Xuerong Lv, Ke Yan, Xiang Han, Feiyang Wang, Yuzhuo Ma, Shougang Zhang, Xiaoqian Wang

    Published 2024-12-01
    “…Objectives Microbial contamination of various accessory parts of the dental chair units (DCUs) is an essential source of cross infection, while the accessories of the crucial suction function are usually overlooked. …”
    Get full text
    Article
  8. 988
  9. 989

    A lightweight transformer based multi task learning model with dynamic weight allocation for improved vulnerability prediction by Lan Liu, Zhanfa Hui, Guiming Chen, Tingfeng Cai, Chiyu Zhou

    Published 2025-08-01
    “…Traditional methods, such as single-task learning and ensemble approaches, often struggle with these challenges, particularly in detecting rare but critical vulnerabilities. To address this, we propose the MTLPT: Multi-Task Learning with Position Encoding and Lightweight Transformer for Vulnerability Prediction, a novel multi-task learning framework that leverages custom lightweight Transformer blocks and position encoding layers to effectively capture long-range dependencies and complex patterns in source code. …”
    Get full text
    Article
  10. 990

    Mid-infrared Ensemble Variability of Broad-line and Narrow-line Seyfert 1 Galaxies by Zhipeng Hu, Lisheng Mao

    Published 2025-01-01
    “…The MIR variability of the combined sample is positively correlated with black hole mass and the FWHM of the H β emission line at long rest-frame time lags. (4) The long-term MIR variability of the combined sample may be mainly driven by the Eddington ratio. (5) For BLSy1 galaxies, the MIR variability of radio-detected sources is greater than that of radio-undetected sources, whereas for NLSy1 galaxies, the opposite is true.…”
    Get full text
    Article
  11. 991

    The role of internal auditors in preventing financial fraud in the Republic of Serbia by Jeremić Nebojša, Jakovljević Nemanja

    Published 2023-01-01
    “…By exploring the practices and challenges faced by internal auditors, this paper aims to provide valuable insights and recommendations to strengthen the effectiveness of internal audit functions in detecting and preventing financial fraud. …”
    Get full text
    Article
  12. 992

    Retracted: Study on Modeling Method of Forest Tree Image Recognition Based on CCD and Theodolite by Yeqiong Shi, Sainan Wang, Shuna Zhou, M. M. Kamruzzaman

    Published 2020-01-01
    “…Forest vegetation is the main body that constitutes forest resources. Accurate identification of the types of forest trees can lay the foundation for the research and utilization of forest resources. …”
    Get full text
    Article
  13. 993

    THE SOLUTION TO THE EQUATION OF THE SHOCK WAVE BURGERS IN THE PTC MATHCAD ENVIRONMENT by R. E. Oleynikova

    Published 2022-08-01
    “…However, this error is detected through the values of the nonlinear term included in the differential equation, which is determined according to the binomial representation through the quadratic forms of the matrix of the trial function. …”
    Get full text
    Article
  14. 994

    In-band network telemetry system based on high-performance packet processing architecture VPP by Tian PAN, Xingchen LIN, Jiao ZHANG, Tao HUANG, Yunjie LIU

    Published 2021-03-01
    “…An in-band network telemetry-based system was built based on VPP, a high-performance virtual network forwarding architecture/device, via reorganizing the data plane pipeline processing modules.Moreover, a network-wide telemetry mechanism was further developed via embedding source routing into the probe packet header for specifying the route of probe packets.Finally, a virtual network topology was built with performance evaluation conducted.The evaluation shows that the telemetry system can monitor the network in a high precision of every 0.13 ms, detecting link congestion in real time with minor performance overhead.Given virtual network devices have been widely deployed in data centers, the proposed scheme is expected to improve the reliability of multi-tenancy and network function virtualization in data centers via high-precision, network-wide virtual link telemetry coverage.…”
    Get full text
    Article
  15. 995
  16. 996

    Conditions for the emergence of circumnutations in plant roots. by Ilya Loshchilov, Emanuela Del Dottore, Barbara Mazzolai, Dario Floreano

    Published 2021-01-01
    “…Here we describe a model capable of replicating root growth behaviors, which we used to analyze the role of circumnuntations, revealing their emergence I) under gravitropic stress, as a combination of signal propagation and sensitivity to the signal carriers; II) as a result of the interplay between gravitropic and thigmotropic responses; and III) as a behavioral strategy to detect and react to resource gradients. The latter function requires the presence of a hypothetical internal oscillator whose parameters are regulated by the perception of environmental resources.…”
    Get full text
    Article
  17. 997
  18. 998

    Balancing Performance and Portability: A Study on CsI(Tl) Crystal Sizes for Real-Time Gamma-Ray Spectrum and Dose Monitoring by Nikolaos Voulgaris, Hikari Nishimura, Shingo Tamaki, Sachie Kusaka, Isao Murata

    Published 2024-07-01
    “…This was accomplished by calculating the detection efficiency and energy resolution through experimental measurements using standard gamma-ray sources and simulations using MCNP5. …”
    Get full text
    Article
  19. 999

    Egyptian pediatric kidney transplantation: highlights on post-transplant follow-up and management of complications by the Egyptian Pediatric Clinical Practice Guidelines Committee... by Bahia Moustafa, Neveen A. Soliman, Ihab Shaheen, Ahmed Badr, Fatma M. Atia, Mohamed K. El Hatw, Engy Adel Mogahed, Mona EL-Ghamrawy, Khaled El Khashab, Noha Shaheen, Mohamad G. Shouman, Abeer Selim, Magdy El-Sharkawy, Tarek Abd El Azeem, Mohamad Esmat, Manal Salman, Bedeir Ali-El-Dein, Mona Abdel Rahim, Muhamed A. El-Hadedy, Moatasem Elsayed Ghoneim, Mai S. Korkor, Tarek E. I. Omar, Yasser Amer, Ashraf Abdel Baky, On Behalf of Egyptian Pediatric Clinical Practice Guideline Committee

    Published 2024-10-01
    “…Infections, rejection, recurrence, malignancy, bone problems, hypertension, and surgical complications are the most important challenges that require prevention, early detection, and management. Chronic allograft nephropathy needs different approaches based on its related causes, allograft pathology, graft function, and availability of re-transplantation. …”
    Get full text
    Article
  20. 1000

    Practical Implementation of a Smart Home Model Using Arduino and Sensors by Soufiane Hachani, Okba Benelmir

    Published 2025-05-01
    “…Controlling outdoor lighting based on ambient light intensity detected by a light sensor. Activating a security alarm by touch detection using a touch sensor. …”
    Get full text
    Article